Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2016-4997

Description

The compat IPT_SO_SET_REPLACE and IP6T_SO_SET_REPLACE setsockopt implementations in the netfilter subsystem in the Linux kernel before 4.6.3 allow local users to gain privileges or cause a denial of service (memory corruption) by leveraging in-container root access to provide a crafted offset value that triggers an unintended decrement.

POC

Reference

- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html

- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html

- http://www.ubuntu.com/usn/USN-3017-2

- https://www.exploit-db.com/exploits/40435/

- https://www.exploit-db.com/exploits/40489/

Github

- https://github.com/HaxorSecInfec/autoroot.sh

- https://github.com/JlSakuya/Linux-Privilege-Escalation-Exploits

- https://github.com/XinLiu2025/openkylinsat

- https://github.com/a-roshbaik/Linux-Privilege-Escalation-Exploits

- https://github.com/vlain1337/auto-lpe